Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.816  Word version:  10.0.0

Top   Top   Up   Prev   Next
1…   4…   10…

 

4  Relay Architecturep. 10

5  Threatsp. 12

6  Requirementsp. 15

7  Security Architecturep. 17

8  Security Proceduresp. 19

8.1  Analysis of Un interface securityp. 19

8.2  Security for the RN NAS trafficp. 23

8.3  Security for the RN RRC trafficp. 23

8.4  Mutual Authenticationp. 23

8.5  Enrolment procedures for RNsp. 23

8.6  Location verificationp. 24

8.7  Security handling in handoverp. 24

8.8  Analysis of key interaction on Un interfacep. 26

8.9  Differentiation the RN and UE by the DeNBp. 26

8.10  NAS signalling securityp. 27

8.11  Algorithm negotiation for RBs on Un interfacep. 27

9  Device Securityp. 28


Up   Top   ToC